1Posts & Books
- How to design a VM for MPC?
- Cryptographers are not happy with how you’re using the word ‘crypto’
- Dusk Network to use Grants program for Zero-Knowledge research
- Infinite Privacy: New Anonymity Paradigms with Aztec Network
- State of research: increasing censorship resistance of transactions under proposer/builder separation (PBS)
- GDPR Compliance: Staying Current with State-of-the-Art Cryptography
- Clusters: how trusted & trust-minimized bridges shape the multi-chain landscape
- Computing classical combinatorial numbers
- Computational Cryptography: Algorithmic Aspects of Cryptology February 2022
2Videos & Podcasts
- zkStudyClub: PLONKUP & Reinforced Concrete
- 揭秘隐藏了18年的金光之谜:解析《黑客帝国3》 开幕的金光
- ZK HACK #5 - Introduction to Aztec Connect
3Projects & Docs
- Winterfell: A STARK prover and verifier for arbitrary computations.
- mcl: A portable and fast pairing-based cryptography library.
- hacspec: A specification language for crypto primitives and more in Rust.
- Introduction to
arkworks algebra APIs - How to install EasyCrypt and Jazmin
4Papers & Conferences
- InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services
- Clarion: Anonymous Communication from Multiparty Shuffling Protocols
- Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
- HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation
- Practical Garbled RAM: GRAM with Overhead
- On Cryptocurrency Wallet Design
- An Improved Range Proof with Base-3 Construction
- Amortizing Rate-1 OT and Applications to PIR and PSI
- A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
- An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH
- Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
- On the Download Rate of Homomorphic Secret Sharing
- The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n
- An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
- SoK: Tokenization on Blockchain
- Route Discovery in Private Payment Channel Networks
- Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably)
- Average-case Hardness of NP and PH from Worst-case Fine-grained Assumptions
- Sublinear quantum algorithms for estimating von Neumann entropy
- A Guide for New Program Committee Members at Theoretical Computer Science Conferences
5Upcoming Events
- On the Security of Homomorphic Encryption on Approximate Numbers by Daniele Micciancio Thu, 25 Nov 2021 16:00
- Noah Fleming (UCSD) - Extremely Deep Proofs 25/November/2021 (Thursday) at 5pm London Time
- Layer 2 Scaling Solutions Tuesday, November 30, 7PM HKT / 12PM CET
- ZK Jobs Fair #5 (with ZK Hack Party) Fri, December 3, 2021 2:00 AM – 5:00 AM CST
- The 12th BIU Winter School on Cryptography: Advances in Secure Computation January 23-26, 2022
- StarkNet Ecosystem Summit 2022 Thu, Jan 27, 2022, 9:00 AM – Fri, Jan 28, 2022, 6:00 PM PST
- PRIVACY-ENHANCING TECHNOLOGY SUMMIT EUROPE ZURICH, SWITZERLAND 4-6 APRIL, 2022
往期周刊回顾:
Kurt Pan 密码周刊 (46)
Kurt Pan 密码周刊 (45)
Kurt Pan 密码周刊 (44)
Kurt Pan 密码周刊 (43)
Kurt Pan 密码周刊 (42)
Kurt Pan 密码周刊 (41)
Kurt Pan 密码周刊往期回顾 (31-40)
Kurt Pan 密码周刊往期回顾 (20-30)
Kurt Pan 密码周刊往期回顾(11-20)
Kurt Pan 密码周刊往期回顾 (1-10)
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问